Skip to main content
false

Security Blogs

Security
3 Min Read
Announcing the availability of Cisco Talos Incident Response services to Splunk customers.

Latest Articles

Security 5 Min Read

The New Normal: Organizations Need Security Leaders More Than Ever

Security leaders, including chief information security officers (CISOs) face new security challenges as well as opportunities. They need to start by contemplating the long-term impact of the COVID-19 crisis on various aspects of the security program.
Security 4 Min Read

Checking for SIGRed (CVE-2020-1350) and CISA ED 20-03 with Splunk

Using Splunk Enterprise to check for CVE-2020-1350 vulnerabilities and detect exploitation attempts using wire data on Windows DNS servers.
Security 8 Min Read

CI/CD Detection Engineering: Splunk's Security Content, Part 1

This blog is part 1 of a 3 part series that includes a step-by-step walk-through of how to use Splunk Security-Content, Attack Range and CircleCI to do detection development, continuous testing, and deployment as a workflow in your security operation center.
Security 2 Min Read

Nation-State Espionage Targeting COVID-19 Vaccine Development Firms - The Actions Security Teams Need To Take Now!

The UK NCSC published an advisory report that threat group APT29 most recently targeted organizations which are involved in COVID-19 vaccines development and testing. Find out if your organization is affected and which actions you need to take now.
Security 1 Min Read

Tackling Financial Crime is a Matter of Data: Fresh Thinking on an Age-Old Problem

Introducing Splunk's latest thinking on an age-old problem — fighting financial crime. Two new assets explores the current financial crime landscape and key challenges, and also outlines a six-stage framework for using Splunk to operationalize data.
Security 2 Min Read

Supercharged SOAR: Meet Splunk Phantom 4.9

Now available: Splunk Phantom version 4.9 enhances Phantom’s performance, scalability and speed to automate the ever-increasing volume of security events a SOC must contend with each day.
Security 6 Min Read

Approaching Azure Kubernetes Security

Introduction to monitoring security in Azure Kubernetes Clusters using Splunk.
Security 1 Min Read

Detecting Malware and Watering Hole Attacks with Splunk UBA

Watering hole attacks involve a web server that hosts files or applications where the website or files on the site become weaponized with malware. Learn how you can detect and prevent these attacks with Splunk UBA.
Security 4 Min Read

Staff Picks for Splunk Security Reading June 2020

Check out our favorite June 2020 security-centric presentations, white papers and customer case studies from the Splunk (or not) security world.
Security 3 Min Read

Prevent and Detect Threats Across Multi-Cloud Environments

Learn how to prevent and detect cloud attacks against targets like admins, users and data across AWS, Microsoft Azure and Google Cloud environments.
Security 3 Min Read

Unmask Big Threats in the Big Apple: Lessons From the NewYork-Presbyterian SOC Team

Learn about how the NewYork-Presbyterian SOC team uses Splunk to safeguard their networks.
Security 2 Min Read

Between Two Alerts: Phishing Emails – Less Ocean, More Aquarium

Gain a better foundation to quickly triage and investigate phishing attacks through SOAR.
Security 1 Min Read

The Next 12 Months - Where IT Leaders Anticipate Spending More Time On

IDG’s recent “State of the CIO” survey across IT leaders has revealed the impact of COVID-19 on IT organizations and the sudden and unforeseen shifts of their initial 2020 plans.
Security 2 Min Read

Splunk Security Essentials 3.1: Enhanced MITRE ATT&CK Matrix: Find the Content that Matters the Most to You, Faster

This blog will guide you through some of the new features of Security Essentials 3.1 that will help you find the content that matters the most to you, faster.
Security 6 Min Read

Staff Picks for Splunk Security Reading May 2020

Check out our favorite May 2020 security-centric presentations, white papers and customer case studies from the Splunk (or not) security world.
Security 4 Min Read

Dear Buttercup: MITRE ATT&CK Integration is a Notable Event

Contextualizing correlation searches and notable events in Splunk Enterprise Security with MITRE ATT&CK techniques provides SOC analysts with greater insights into the events they are analyzing
Security 2 Min Read

WFH: A New Reality with New Threats

Working from home expands the cybersecurity threat landscape and attack surface, learn how you can empower your remote workers with Splunk.